So for the past five or more years I have suffered along with pain in my left foot. At times the outside of my my foot; near the small toe would go numb. At other times it would feel like someone was using pliers to pull the forth toe out of my fo...
Category: Personal
Questioning the Value of CISSP
What if everyone let his (or her) CISSP lapse? Dave Piscitello is a 37 year networking and Internet veteran who now focuses on Internet Security who wrote an interesting essay about his views of the CISSP certification. Good read. Not a rant. He m...
Back from Vacation!
OK. It wasn't all vacation. July saw me in Las Vegas with my employer managing the Security track and speaking at a conference. I cam back to almost three weeks of over due work. I cleared that all up AND THEN I took two weeks off with the family....
My Hometown newspaper got all Cyber this past weekend!
Long Island Newsday had a very well written editorial on Sunday titled "Cyber insecurity". In addition they featured an opinion piece written by Peter Goldmark titled "Small, smart,and anonymous" that addresses and discusses the transformation tha...
The NY State Cyber Security Conference, June 7-8, 2011 in Albany NY
Last week I attended the 14th annual NY State Cyber Security Conference held at the state office and conference center complex (under The Egg) in Albany, NY. The 6th Annual Academic Symposium on Information Assurance ran concurrently with the main...
Securing Your Twitter Account
After reading about the tweets attributed to NY Representative Anthony Weiner this past weekend I took a look at what the "right" way of dealing with the compromise of a Twitter account would be. The folks at twitter do a pretty good job at provid...
Data on the 2010 Gawker Media password breach
A major security breach event for 2010 was the password disclosure at Gawker Media. On December 12th, 2010 Gawker Media discovered that their servers were compromised, resulting in a security breach at their web sites: Lifehacker, Gizmodo, Gawker,...
Using Google Docs to Administer Surveys
I recently thought that some of my Personal Cybersecurity work could be made much more interesting if I wee to develop some data on my own; perhaps by conducting my own surveys. I started looking around at web based tools for administering surveys...
Old Fashioned Confidence Fraud is Alive and Well
Subtitled: And there are two sides to every story?First you read the story about the alleged victim, the alleged thieves, and alleged fraud. http://bit.ly/fCJ8Wg Then you find more reporting; perhaps detailing the alleged thieves (defendants) poin...